We know that support experience can be frustrating when the engineer on the other side does not fully understand the exact issue that you are facing and you get into the long back and forth with questions, answers, and screenshots.
There is now a better way! When creating a support ticket, you can now simply select the Allow Access to WSO2 Support checkbox and the engineer that gets your ticket assigned will be able to securely access your WSO2 deployment and troubleshoot the issue:
This new feature radically shortens the resolution time and gets your going with your project faster. And once the ticket is resolved, you can simply go to the Organization screen (in the 9-dot menu) and revoke the access.
We have extended our public uptime dashboard to go beyond just API Cloud and its default gateway. From now, on API Cloud’s indicators include:
- Web interfaces (Publisher, Admin Dashboard, Developer Portal),
- Key Manager,
- Developer Portal (aka API Store),
- Regional Gateways.
Even more importantly, we now have public dashboard indicators for the other WSO2 Cloud services:
- WSO2 Integration Cloud,
- WSO2 Identity Cloud,
- WSO2 Device Cloud.
For all of these, you can see whether the service is up or down at the moment, how well it performed lately, and can even drill down into uptime and performance over the last few months and get a list of all disruptions we had during the selected period:
In addition to the uptime dashboard, all paying customers get incident notification and post-mortem emails as well as maintenance announcements.
WSO2 Cloud comes with financially backed uptime SLA and our public availability dashboards and incident notification processes help ensure transparency of our quality of service and processes.
November 6-8 in London we will be holding our biggest European event of the year – WSO2Con Europe 2017. I will personally be there as well as our other key leaders, architects, and engineers, and many of our customers.
My personal request to all our cloud customers is to go ahead and submit a session proposal!
Conference talks are a great way to increase your own visibility and boost your career. And you also get perks including free airfare, hotel, and conference pass! There is a deadline of July 28 – so please try to meet it. If you cannot – please let me know so I can apply some lobbying for you. 🙂
If submitting your talks is not your thing (yet) go ahead and buy your conference pass today while the early bird discount is still in place.
Plus, the website also has lots of great recordings from earlier conferences.
I hope to see you in London in November!
WSO2 Identity Cloud is out of beta and fully available.
- Pricing starts at $2/user/month and goes down with volume to as little as 20 cents.
- You only pay for the users actually using the system. Your idle accounts don’t cost you anything.
- There is a fully functional 2-week trial.
- Identity Cloud includes single sign-on (SSO) for:
- SaaS applications over standards-based federation (SAML 2.0, WS-Federation, OpenID Connect),
- Homegrown apps over JWT,
- Popular applications such as Salesforce.com, Zuora, NetSuite, GoToMeeting, Concur, AWS.
- Your end-users also get a brandable user portal with application catalog for easy application discovery.
Huge thanks to everyone who tried the beta and provided feedback. Thanks to that we significantly improved the service making the LDAP agent firewall-friendly and implementing custom URL functionality and theming for the user portal.
Try WSO2 Identity Cloud today and let us know what you think!
We have made it easier to pay for WSO2 Cloud services (API, Integration, Device, and Identity). When we launched initially, monthly credit card payments were the only option we provided. Now we changed two things:
1. You can pay for a year ahead and save 10% of your subscription price:
2. And, if credit card is not something that your purchasing department likes, you can get a regular invoice and pay via a wire transfer instead:
Whatever is the WSO2 Cloud service of your choice, we would like you to be able to pay for it conveniently (and save money on the way!)
It has just become a lot easier to connect your corporate directory to web applications. WSO2 Identity Cloud’s agent now itself initiates its connection to the cloud and thus does not conflict with firewalls or require a DMZ placement.
WSO2 Identity Cloud is a simple way to enable single sign-on (SSO) from your LDAP to your and 3rd-party web applications, and also to give end-users a nice application catalog portal to locate and access their apps. When we originally launched the offering, the cloud service was initiating all connections to the LDAP agent, and thus you had to get the agent installed on a server visible on the internet. With today’s update, you no longer have to do that.
Now, you can install the agent on any server that can get to the internet itself. You can even take your own laptop with OpenLDAP running on it, and use that to evaluate our service.
All you have to do is:
- Go to WSO2 Identity Cloud,
- Sign in,
- Click the Connect your user store button,
- Click Connect my LDAP to Cloud to download the agent:
5. Follow the instructions on the agent download page to download the agent and configure it to connect to your LDAP and your cloud account:
6. Once the cloud starts seeing the agent, your users can start using their LDAP credentials to access the applications you hooked up to the cloud:
See detailed documentation here: Configuring an On-premise User Store
I am happy to announce that we have launched the free beta of WSO2 Identity Cloud.
WSO2 Identity Cloud is based on the open-source WSO2 Identity Server product. It helps companies set up single sign-on (SSO) from their local enterprise directories to web applications.
You also get a brandable application catalog page for easy application discovery.
- You improve your corporate security:
- Users no longer access web apps when their enterprise credentials are disabled.
- You can see who accesses which applications.
- Your password security is enforced across all applications.
- You make your employees more productive:
- They no longer have to maintain multiple passwords,
- They can find the applications available to them.
- You can reduce costs:
- Reports let you see which applications are actually in use by whom.
Here’s how you can get started:
1. Log into Identity Cloud,
2. Download the agent to connect the cloud to your local user store,
3. Add applications to the catalog (with predefined templates, uploaded definition files, or manual settings):
That’s it! Your users can access the applications directly or via a nice application catalog page:
See more information in Identity Cloud documentation and let us know what you think!